Decentralized Permissionless Infrastructure for Self-Sovereign Identity
Internet of People (IOP) provides a Self-Sovereign Identity framework based on W3C standards to provide SSI solutions, store schemas, decentralized IDs (DIDs), keys, rights and proof timestamps on a ledger for public verification, keeping verifiable claims (VCs) off-ledger.
The IOP Solution
It’s time to reverse the centralisation, the indiscriminate commodification of data, and in particular the erosion of personal privacy that sadly have become hallmarks of today’s digital world. It is time for the open, borderless, and secure identity verification of self-sovereign identity.
The IOP Network is the new open standard for digital identity – built on fundamentals provided by organizations such as W3C to provide decentralized self-sovereign identity and trust solutions via an interdependent ecosystem of open protocols, decentralized tools, and services built with the latest cryptographic technologies and secured by the permissionless Hydra blockchain and token.
The IOP stack give anyone full control over their identities and their personal and professional connections. Anyone can use IOP to present verifiable claims without the need for a third party or compromising their privacy. This will revolutionize a wide range of industries, as well as providing access to proof of identity, credentials, and ownership to billions of currently underserved people.
“Self-sovereign” means self-ownership of the individual identity holder.
It is a model for managing digital identities in which an individual or entity has sole ownership over the ability to control their accounts and personal data.
Open. Fair. Trustless. Private. Simple!
Read about IOP
Read about the Hydra Blockchain and Token
Read about the Delegates
During the second half of 2019, there were several development goals that we wanted to reach. One of the most important goals was to have a stable running blockchain available to the public after switching to a new blockchain. The delegate and staking system of the...
Identity and Access Management
Many companies and other organizations need to manage identity and access for employees and visitors to their sites, with yearly global spending in excess of $8bn . But current approaches are extremely expensive, inflexible, and often exhibit glaring security vulnerabilities. Using IOP’s identity protocols, companies are able to issue identity cards and adjust access rights on the fly, as well as easily grant and revoke visitor access thanks to standardization. This concept can easily be extended from physical to digital access. For example, managing access rights to shared company drives and other digital resources from a users’ own device.
Online learning is poised to revolutionize the way we learn and open up educational opportunities to billions of currently underserved people around the world. But qualifications earned via e-learning platforms currently have a poor reputation, even when affiliated with established brick and mortar institutions. Part of this is resistance to change, but it’s also undeniable that online credentials are hard to track and easy to forge for both unscrupulous users and institutions alike. IOP’s technology allows universities and students to track and prove attendance, grades, and degrees as well as less tangible factors such as quality of education and student satisfaction using mutually provided verifiable claims. Future employers can easily verify grades and credentials with the issuing entity without the danger of personal user data falling into the wrong hands or companies overreaching their boundaries and asking for more data than they really need.
For many businesses, complying with ever-changing data regulations is costly and time consuming, especially when operating across multiple jurisdictions. Companies must find a way to gather, process, and then securely store user data such that they can prove compliance — often for audits that occur many years after the fact. For many smaller businesses, these costs are so high that they are forced out of the market. With IOP’s approach to identity and verifiable claims, regulatory compliance is streamlined and risk is reduced for both users and companies. Because data tends to stay under full user control, it is easy to prove that it has been handled properly. At the same time, by completely separating personal data from the ownership of a digital identity, IOP supports far more secure and stringent data protection rules than are currently implemented in most countries around the world.
Harvesting personal data isn’t just bad for users: it can also become a massive liability for companies, who may not have the expertise to properly store and secure that data. Data breaches are a daily occurence, despite yearly cybersecurity spending approaching $100bn (as estimated by Gartner ). IOP provides significant cybersecurity benefits over existing centralized approaches. At a basic level, making local storage and full user control the default for all data significantly reduces the risk of hacking or accidental exposure of data. Beyond that, IOP provides numerous opportunities for companies wishing to offer security as a service. For example, companies could provide secure backup for users’ claims and credentials or give them the ability to share and access credentials from the cloud. Unlike current cloud-based approaches, data security would not be compromised as all data would be encrypted before transmission to the service provider.